I.C.T. coursework on Computer games retail store.

Extracts from this document...

Introduction

CONTENTS DESCRIPTION PAGE Problem Specification The organisation that I have chosen to base my work on is a computer games retail store. It is called 3G, a small shop which just opened up recently under a very low budget. However, they have made funds available to develop their system, as currently they have no I.C.T system whatsoever. They do all of their receipts, stock taking and stock ordering by writing it each time it is needed. They have asked for all new stock to be brought in, hardware and software, so everything will be compatible and should be ready for use in little to no time. 3G games buy all of its products (hardware and software) from the supplier and accept cash and/or debit cards. Every week, the employees need to count the stock and cross-reference it with the receipts, checking if anything is lost or stolen, and then re-ordering any goods. In the current system, there are several different users with different access rights. The manager has unlimited access to all parts of the system, and is able to edit, add or delete information. The stock manager can also add, delete or edit information, whilst the workers cannot do any of this, they can only add information into the system. There is not much knowledge within the store as it lacks the sufficient equipment. Currently, there are no help resources for anybody to use since it is unnecessary, but there will be an implementation created to give help to who ever needs it. ...read more.

Middle

This is to do with the security outside the computer (to the hardware). This can be put into place later on by applying locks to the work stations, keeping them on the desk where it will be positioned at all times. All of this security can be supplied to the store easily, as it is available from many places, and some with cheap deals. Backup will be carried out at least once every week. The reason for this being that backing-up data is not long to do, is very cheap to perform but can still save the store lots of time and money if ever their system goes down, or their data is tampered with. In order to back up the files, I will be copying the data from the hard drive onto a DVD/CD data disk, as CD's and DVD's can store much more data than a floppy disk, and if looked after properly can last a very long time. There will be 2 copies of each DVD/CD, where one will be kept in a safe, and one with the manager, in case one DVD/CD does get tampered with. The DVD/CD will then be kept for a maximum of 2 months before being erased and re-written over. There is a DVD/CD rewriter in the computer workstations, allowing us to be able to write a DVD/CD. This is because 2 months is a long enough time to realise if there was a fault in the system earlier on. ...read more.

Conclusion

> Take classes - enrol into a adult education ICT course where you can learn most of the basics and interact with others. > SELECTED OPTION: Home training course - Many companies and websites offer a home training course, allowing the user to take home tutoring CD's for them to learn themselves at their own pace (e.g. www.discoveryvip.com) Making a back-up of the database User Creation Users Users of this system must have prior knowledge to windows and microsoft access. They must undergo the same training types of training as the administrators (e.g. personal CD tutoring) but they can learn less compared to the administrators. They need to be on training for between 2-3 weeks, and if they need more time then the maximum is a month. To obtain data on where to get these CD's, go to www.discoveryvip.com. Or on how to use microsoft access and other such applications, go to http://www.it-can.org/training/pdfs/Manual_Beginners.pdf. It is a site containing many useful web sites which give good guides to I.C.T for beginners. Conclusion Throughout the course of this study, I have learnt many new things; how a business is run, how a business can improve with the right system & equipment and how I can now put together a system strong enough for a store to produce profit from. If I were to carry out the project again, I would probably try to support a store which already has a system with good equipment and software, as then there would be much less costs needed to boost their system but still with the same effect. ...read more.

Related AS and A Level Computer Science essays

Current it is they method used for deploying portable broadband internet to devices. You would normally find Wi-Fi connections in hotels, cafes & airports. People have started to use it at home as well. Nearly all personal computer operating systems, game consoles, laptops, smart phones, printer and other peripherals support Wi-Fi.

on site observations I observed the store and its activities by visiting for some days SYSTEMS DEVELOPMENT LIFE CYCLE (SDLC) Every system has a life cycle, like that the human beings, plants or a product. A System Development Life Cycle (SDLC)

They are to: * display pages of information that can be browsed using hot links * automate actions in applications software using macros Programming languages change as ICT develops. Professional programmers use the more complex programming languages to create new applications software.

to be written in manually by the user thus cutting down on human or syntax error. The screen print below shows one such list box which brings up possible suggestions for peoples name titles. However if there was a duke the user simply has to type in the title and the system will accept it.

Validation is ensured by using an auto number data type to automatically update the TeamCode attribute. 4. frmTournament The tournament form works exactly the same as the previous forms, with add and delete buttons clearly labelled and a combo box for navigation.

This request releases all storage associated with a session. *?Encrypt/Decrypt data. The requested data is processed and the resulting ciphertext or plaintext is returned in the result packet. Additional administrative requests are supported that allow the host processor to initialize CM processor memory and redirect execution of individual CM processors.

I used Word to criticise my three databases. Microsoft Access and the Internet were the most useful to me. I used Microsoft Access to create my tables using the Wizard for my databases. I used the Internet to find out information about the latest singles to download relevant information about